Note
hsu.cy·16h
⬜Minimalism
Flag this post
Kinly launches publicly available open AV security standards
madcornishprojectionist.co.uk·3d
🎬AV1 Encoding
Flag this post
Migrating from Open Policy Agent to Amazon Verified Permissions
aws.amazon.com·20h
🔐Capability Systems
Flag this post
Discover’s Data Manager Helps Foil Credit Card Fraudsters
spectrum.ieee.org·20h
🗃️Database Forensics
Flag this post
Securing the Wireless Perimeter: Modern Threats to AI, Hyperscale, Enterprise, and Classified Data Centers Part 2
bastille.net·2d
📊Homelab Monitoring
Flag this post
Creating a Linux Application Using VSCodium, Cline, OpenRouter, and Claude
🔓Open Source Software
Flag this post
Dennis Ritchie's story of dabbling in the cryptographic world
🔐Cryptographic Archaeology
Flag this post
2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned
troyhunt.com·1d
🔓Hacking
Flag this post
Cameras, Cameras Everywhere!
🎯Threat Hunting
Flag this post
Happy Eyeballs Version 3: Better Connectivity Using Concurrency
📡Network Protocol Design
Flag this post
The Cyber Regime Change Pipe Dream
news.risky.biz·13h
🔓Hacking
Flag this post
Former cybersecurity employees attempted to extort five U.S. companies in 2023 using BlackCat ransomware attacks
securityaffairs.com·1d
🔓Hacking
Flag this post
Digital Forensics Round-Up, November 05 2025
forensicfocus.com·23h
🔬Archive Forensics
Flag this post
Japan Mino Kogyo Ransomware Attack
🌐Network Security
Flag this post
AI-based malware makes attacks stealthier and more adaptive
cybersecuritydive.com·22h
🕵️Vector Smuggling
Flag this post
What’s Left Of The FBI Gets Back To Turning Teens Into Terrorists
techdirt.com·22h
🎯Threat Hunting
Flag this post
Integrity Under Siege: A Rogue gNodeB's Manipulation of 5G Network Slice Allocation
arxiv.org·10h
🌳Archive Merkle Trees
Flag this post
Loading...Loading more...